Database Reference
In-Depth Information
physically located, and what identity and method they have authenticated with, all in
real time. This makes auditing and compliance much more simple because you can track
everything back to an individual and their location.
Figure 8.28 (from VMworld 2013's SEC5891, “Technical Deep Dive: Build a
Collapsed DMZ Architecture for Optimal Scale and Performance Based on NSX
Firewall Services”) demonstrates this concept showing a typical three-tier application
and the security access for web admins and DBAs from secured virtual desktops, based
on their user credentials.
Figure 8.28 Virtualized networking security with context awareness.
By creating security policy based on user identity and location, you can ensure access
only from authorized groups of users, prevent insider attacks, and gain access into
which users are accessing which applications and when. You can provide greater
security to your DMX, applications, and SQL databases, while providing greater
visibility and auditability to your security teams. All of this combined means you don't
have to sacrifice SQL Server and application network performance when implementing
compliance and security.
 
 
Search WWH ::




Custom Search